Release Notes: This release fixes potentially poor random number generation for users who use OpenSSL 1.0.0 or later, set "HardwareAccel 1" in their torrc file, have "Sandy Bridge" or "Ivy Bridge" Intel processors, and have no state file in their DataDirectory (as would happen on first start). Users who generated relay or hidden service identity keys in such a situation should discard them and generate new ones.
Release Notes: This release features a new circuit handshake and link encryption that use ECC to provide better security and efficiency; makes relays better manage circuit creation requests; uses "directory guards" to reduce client enumeration risks; makes bridges collect and report statistics about the pluggable transports they support; and cleans up and improves the geoip database. The release also includes many stability, security, and privacy fixes.
Release Notes: This release is the fourth release candidate for the Tor 0.2.4.x series. It takes a variety of fixes from the 0.2.5.x branch to improve stability, performance, and better handling of edge cases.
Release Notes: This release introduces experimental support for syscall sandboxing on Linux, allows bridges that offer pluggable transports to report usage statistics, fixes many issues to make testing easier, and provides a pile of minor features and bugfixes that have been waiting for a release of the new branch.
Release Notes: This is the second release candidate for the Tor 0.2.4.x series. It fixes several crash bugs in the 0.2.4 branch.
Release Notes: This release makes relay measurement by directory authorities more robust, makes hidden service authentication work again, and resolves a DPI fingerprint for Tor's SSL transport.
Release Notes: This release reduces directory overhead, provides enormous crypto performance improvements for fast relays on recent hardware, a new v3 TLS handshake protocol that can better resist fingerprinting, support for protocol obfuscation plugins, better scalability for hidden services, IPv6 support for bridges, performance improvements like allowing clients to skip the first round-trip on the circuit ("optimistic data") and refilling token buckets more often, a new "stream isolation" design to isolate different applications on different circuits, and many stability, security, and privacy fixes.
Release Notes: This release fixes another opportunity for a remotely triggerable assertion, resumes letting relays test reachability of their DirPort, and cleans up a bunch of smaller bugs.
Release Notes: This release fixes two opportunities for remotely-triggerable assertions.
Release Notes: This release fixes a rare race condition which could crash exit relays, fixes a remotely-triggerable crash bug, and fixes a timing attack which could leak path information.